咨询与建议

限定检索结果

文献类型

  • 895 篇 期刊文献
  • 756 篇 会议
  • 10 册 图书

馆藏范围

  • 1,661 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,124 篇 工学
    • 822 篇 计算机科学与技术...
    • 704 篇 软件工程
    • 242 篇 信息与通信工程
    • 153 篇 生物工程
    • 128 篇 电气工程
    • 119 篇 控制科学与工程
    • 105 篇 化学工程与技术
    • 86 篇 机械工程
    • 85 篇 电子科学与技术(可...
    • 85 篇 生物医学工程(可授...
    • 78 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 34 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 28 篇 建筑学
    • 28 篇 交通运输工程
  • 541 篇 理学
    • 304 篇 数学
    • 166 篇 生物学
    • 101 篇 统计学(可授理学、...
    • 92 篇 物理学
    • 52 篇 系统科学
    • 46 篇 化学
  • 331 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 70 篇 医学
    • 60 篇 临床医学
    • 55 篇 基础医学(可授医学...
    • 33 篇 公共卫生与预防医...
  • 47 篇 法学
    • 36 篇 社会学
  • 39 篇 经济学
    • 37 篇 应用经济学
  • 23 篇 农学
  • 17 篇 教育学
  • 7 篇 军事学
  • 4 篇 艺术学
  • 3 篇 文学

主题

  • 52 篇 semantics
  • 50 篇 deep learning
  • 49 篇 feature extracti...
  • 47 篇 training
  • 32 篇 accuracy
  • 31 篇 data models
  • 28 篇 computational mo...
  • 28 篇 machine learning
  • 25 篇 predictive model...
  • 24 篇 convolution
  • 24 篇 optimization
  • 23 篇 internet of thin...
  • 22 篇 federated learni...
  • 22 篇 convolutional ne...
  • 21 篇 conferences
  • 21 篇 graph neural net...
  • 20 篇 blockchain
  • 18 篇 deep neural netw...
  • 18 篇 cloud computing
  • 18 篇 adaptation model...

机构

  • 107 篇 school of big da...
  • 59 篇 school of big da...
  • 54 篇 college of compu...
  • 43 篇 school of inform...
  • 40 篇 state key labora...
  • 40 篇 national enginee...
  • 40 篇 shenzhen researc...
  • 39 篇 school of softwa...
  • 31 篇 school of data a...
  • 29 篇 college of compu...
  • 29 篇 school of data s...
  • 29 篇 school of softwa...
  • 28 篇 school of comput...
  • 25 篇 school of comput...
  • 24 篇 college of compu...
  • 23 篇 school of data s...
  • 22 篇 school of softwa...
  • 22 篇 school of cyber ...
  • 20 篇 school of comput...
  • 19 篇 school of softwa...

作者

  • 32 篇 shi qingjiang
  • 28 篇 shi yinghuan
  • 26 篇 gao yang
  • 24 篇 lan li
  • 22 篇 shen linlin
  • 21 篇 qi lei
  • 18 篇 qingjiang shi
  • 16 篇 mahmood khalid
  • 15 篇 zhang hongyu
  • 14 篇 xiuhua li
  • 14 篇 li xiuhua
  • 14 篇 hu shengshan
  • 14 篇 li minghui
  • 13 篇 jin hai
  • 13 篇 linlin shen
  • 12 篇 xu xiaolong
  • 12 篇 shamshad salman
  • 12 篇 zhang jian
  • 11 篇 dai fei
  • 11 篇 victor c. m. leu...

语言

  • 1,551 篇 英文
  • 98 篇 其他
  • 17 篇 中文
检索条件"机构=School of Data Science and Software Engineering"
1661 条 记 录,以下是1541-1550 订阅
排序:
An automatic detection of green tide using multi-windows with their adaptive threshold from Landsat TM/ETM plus image
收藏 引用
Acta Oceanologica Sinica 2017年 第11期36卷 106-114页
作者: WANG Changying CHU Jialan TAN Meng SHAO Fengjing SUI Yi LI Shujing School of Data Science and Software Engineering Qingdao UniversityQingdao 266071China Institute of Big Data Technology and Smart City of Qingdao Qingdao 266071China Key laboratory of Marine Red Tide Disaster Three-dimensional Monitoring Technology and Application East China Sea BranchState Oceanic AdministrationShanghai 200080China National Marine Environmental Monitoring Center State Oceanic AdministrationDalian 116023China North China Sea Data and Information Service Center North China Sea BranchState Oceanic AdministrationQingdao 266061China
Since the atmospheric correction is a necessary preprocessing step of remote sensing image before detecting green tide, the introduced error directly affects the detection precision. Therefore, the detection method of... 详细信息
来源: 评论
Part-Based data Association for Visual Tracking
Part-Based Data Association for Visual Tracking
收藏 引用
Proceedings of the Digital Image Computing: Technqiues and Applications (DICTA)
作者: Zhengqiang Jiang Du Q. Huynh Jian Zhang Qiang Wu School of Electrical and Data Engineering University of Technology Sydney Sydney Australia School of Computer Science and Software Engineering The University of Western Australia Perth Australia
We present a method that integrates a part-based sparse appearance model in a Bayesian inference framework for tracking targets in video sequences. We formulate the sparse appearance model as a set of smoothed colour ... 详细信息
来源: 评论
Image encryption using random sequence generated from generalized information domain
收藏 引用
Chinese Physics B 2016年 第5期25卷 176-185页
作者: 张夏衍 张国基 李璇 任亚洲 伍杰华 School of Computer Science and Engineering South China University of TechnologyHigher Education Mega Centre School of Mathematics South China University of Technology School of Software Fujian Normal University School of Computer Science and Engineering Big Data Research Center University of Electronic Science and Technology of China
A novel image encryption method based on the random sequence generated from the generalized information domain and permutation–diffusion architecture is proposed. The random sequence is generated by reconstruction fr... 详细信息
来源: 评论
Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks
Deep User Modeling for Content-based Event Recommendation in...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Zhibo Wang Yongquan Zhang Honglong Chen Zhetao Li Feng Xia Jiangsu Key Lab. of Big Data Security & Intelligent Processing NJUPT P. R. China School of Cyber Science and Engineering Wuhan University P. R. China College of Information and Control Engineering China University of Petroleum P. R. China College of Information Engineering Xiangtan University P. R. China School of Software Dalian University of Technology P. R. China
Event-based social networks (EBSNs) are the newly emerging social platforms for users to publish events online and attract others to attend events offline. The content information of events plays an important role in ... 详细信息
来源: 评论
A context-aware user-item representation learning for item recommendation
arXiv
收藏 引用
arXiv 2017年
作者: Wu, Libing Quan, Cong Li, Chenliang Wang, Qian Zheng, Bolong State Key Lab of Software Engineering School of Computer Science Wuhan University China School of Data and Computer Science Sun Yat-Sen University China
Both reviews and user-item interactions (i.e., rating scores) have been widely adopted for user rating prediction. However, these existing techniques mainly extract the latent representations for users and items in an... 详细信息
来源: 评论
Network failure–aware redundant virtual machine placement in a cloud data center
Network failure–aware redundant virtual machine placement i...
收藏 引用
作者: Zhou, Ao Wang, Shangguang Hsu, Ching-Hsien Kim, Myung Ho Wong, Kok-Seng State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China School of Mathematics and Big Data Foshan University Foshan China Department of Information Engineering and Computer Science Feng Chia University Taichung Taiwan School of Software Soongsil University Seoul Korea Republic of
Cloud has become a very popular infrastructure for many smart city applications. A growing number of smart city applications from all over the world are deployed on the clouds. However, node failure events from the cl... 详细信息
来源: 评论
Two-phase locality-sensitive hashing for privacy-preserving distributed service recommendation  1
收藏 引用
9th International Symposium on Cyberspace Safety and Security, CSS 2017
作者: Qi, Lianyong Dou, Wanchun Zhang, Xuyun School of Information Science and Engineering Qufu Normal University Jining China Chinese Academy of Education Big Data Qufu Normal University Jining China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Electrical and Computer Engineering University of Auckland Auckland New Zealand
With the ever-increasing volume of services registered in various web communities, it becomes a challenging task to find the web services that a target user is really interested in from the massive candidates. In this... 详细信息
来源: 评论
Cave Recognition Under Tensor Flow Platform
Cave Recognition Under Tensor Flow Platform
收藏 引用
2nd International Conference on Artificial Intelligence and engineering Applications(AIEA 2017)
作者: MIN ZHAO CHANGJIANG WEI SHUHUA WANG School of Data Science and Software Engineering Qingdao University West Branch Research Institute of Petroleum Exploration and Development Shengli Oilfield SINOPEC
Based on the analysis network of Tensor flow’s advantage parameters of to depth realize learning,the this paper constructs CNN's layer and its key on of classification platform and recognition *** of underground ... 详细信息
来源: 评论
Image Super-resolution Reconstruction Algorithm Based on Bayesian Theory
Image Super-resolution Reconstruction Algorithm Based on Bay...
收藏 引用
IEEE Conference on Industrial Electronics and Applications
作者: Wenbo Zheng Fei Deng Shaocong Mo Xin Jin Yili Qu Jiangwei Zhou Rui Zou Jia Shuai Zefeng Xie Sijie Long Chengfeng Zheng School of Software Engineering Xi'an Jiaotong University Xi'an China School of Computer Science and Technology Wuhan University of Technology Wuhan China Zhejiang University Hangzhou Zhejiang CN School of Management Huazhong University of Science and Technology Wuhan China School of Data and Computer Science Sun Yat-sen University Guangzhou China School Of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Software Technology Zhejiang University Ningbo China
The Bayesian theory provides a new solution to image super-resolution reconstruction. In view of the poor robustness to noise and motion estimation in the vast majority of super-resolution reconstruction algorithms. I... 详细信息
来源: 评论
Multi-User Revocable Keyword Search Scheme for
收藏 引用
Journal of Physics: Conference Series 2018年 第3期1087卷
作者: Liu Mei Tan Xiao Lei Dong Zhen Fu Cao Jia Chen Shen School of Computer Science and Software Engineering East China Normal University Shanghai Shanghai 200062 China Secure Data Sharing in Cloud
With the rapid development of cloud computing, more and more users store their data in the cloud. Considering the privacy problem of the data sharing in the cloud, searchable encryption makes it possible to efficientl...
来源: 评论